From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
This writer wrestles with the costs and benefits of tighter controls on pseudoephedrine, a key chemical used to make methamphetamine:
Now, personally, I sincerely...schneier From Schneier on Security | February 15, 2012 at 01:09 PM
Adam Shostack explains to Verisign that trust requires transparency.
This is a lesson Path should have learned.schneier From Schneier on Security | February 14, 2012 at 01:12 PM
Liars and Outliers is available. Amazon and Barnes & Noble have ben shipping the book since the beginning of the month. Both the Kindle and the Nook versionsordered...schneier From Schneier on Security | February 13, 2012 at 08:53 PM
Last month, a U.S. court demanded that a defendent surrender the encryption key to a laptop so the police could examine it. Now it seems that she's forgotten the...schneier From Schneier on Security | February 13, 2012 at 11:20 AM
It's an acoustic bluegrass band.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 10, 2012 at 10:04 PM
Interesting paper: Paul J. Freitas (2012), "Passenger aviation security, risk management, and simple physics," Journal of Transportation Security.
Abstract: Since...schneier From Schneier on Security | February 9, 2012 at 12:10 PM
The error rate for hand-counted ballots is about two percent.
All voting systems have nonzero error rates. This doesn't surprise technologists, but does surprise...schneier From Schneier on Security | February 7, 2012 at 11:53 AM
In 2005, I wrote an essay called "The Failure of Two-Factor Authentication," where I predicted that attackers would get around multi-factor authentication systems...schneier From Schneier on Security | February 6, 2012 at 07:23 PM
It's called Squid.
As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered.schneier From Schneier on Security | February 3, 2012 at 10:18 PM
Reuters discovered the information:
The VeriSign attacks were revealed in a quarterly U.S. Securities and Exchange Commission filing in October that followed new...schneier From Schneier on Security | February 3, 2012 at 04:49 PM
Really good article on the huge incarceration rate in the U.S., its causes, its effects, and its value:
Over all, there are now more people under "correctional...schneier From Schneier on Security | February 2, 2012 at 03:04 PM
Brian C. Kalt (2012), "The Idaho Loophole," Georgetown Law Journal, Vol. 93, No. 2.
Abstract: This article argues that there is a 50-square-mile swath of Idaho...schneier From Schneier on Security | February 1, 2012 at 12:05 PM
The storyline:
TSA screener finds two pipes in passenger's bags.
Screener determines that they're not a threat.
Screener confiscates them anyway, because of...schneier From Schneier on Security | January 31, 2012 at 11:03 PM
Some errors in forensic science may be the result of the biases of the medical examiners:
Though they cannot prove it, Dr Dror and Dr Hampikian suspect the difference...schneier From Schneier on Security | January 31, 2012 at 05:13 PM
According to my publisher, the book was printed last week and the warehouse is shipping orders to booksellers today. Amazon is likely to start shipping books on...schneier From Schneier on Security | January 30, 2012 at 07:59 PM